Cyber Posture

CVE-2024-8261

High

Published: 03 March 2025

Published
03 March 2025
Modified
12 September 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0007 22.1th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2024-8261 is an Authorization Bypass Through User-Controlled Key vulnerability (CWE-639) in Proliz Software OBS. It allows exploitation of incorrectly configured access control security levels. The issue affects OBS versions before 24.0927. The vulnerability has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high severity primarily due to confidentiality impact.

A remote, unauthenticated attacker can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation enables the attacker to bypass authorization controls using a user-controlled key, potentially gaining unauthorized access to sensitive data within the affected OBS instance.

The USOM advisory at https://www.usom.gov.tr/bildirim/tr-25-0049 provides details on this vulnerability. Mitigation involves upgrading to OBS version 24.0927 or later, where the issue is addressed.

Details

CWE(s)
CWE-639

Affected Products

prolizyazilim
student affairs information system
≤ 24.0927

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Authorization bypass in public-facing OBS application directly enables T1190 for remote unauthenticated initial access and data exposure.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References